Vulnerabilities > CVE-2020-10711 - NULL Pointer Dereference vulnerability in multiple products

047910
CVSS 5.9 - MEDIUM
Attack vector
NETWORK
Attack complexity
HIGH
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
HIGH
network
high complexity
linux
redhat
debian
opensuse
canonical
CWE-476
nessus

Summary

A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.

Vulnerable Configurations

Part Description Count
OS
Linux
4407
OS
Redhat
6
OS
Debian
3
OS
Opensuse
2
OS
Canonical
5
Application
Redhat
3

Common Weakness Enumeration (CWE)

Nessus

  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2020-2289.NASL
    descriptionThe remote Redhat Enterprise Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:2289 advisory. - kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c (CVE-2017-18595) - kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c (CVE-2019-10126) - kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c (CVE-2019-19768) - kernel: Heap overflow in mwifiex_update_bss_desc_with_ie function in marvell/mwifiex/scan.c (CVE-2019-3846) - Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic (CVE-2020-10711) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-05
    modified2020-06-03
    plugin id137060
    published2020-06-03
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/137060
    titleRHEL 7 : kernel (RHSA-2020:2289)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Red Hat Security Advisory RHSA-2020:2289. The text
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include('compat.inc');
    
    if (description)
    {
      script_id(137060);
      script_version("1.2");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id(
        "CVE-2017-18595",
        "CVE-2019-3846",
        "CVE-2019-10126",
        "CVE-2019-19768",
        "CVE-2020-10711"
      );
      script_bugtraq_id(108521, 108817);
      script_xref(name:"RHSA", value:"2020:2289");
    
      script_name(english:"RHEL 7 : kernel (RHSA-2020:2289)");
      script_summary(english:"Checks the rpm output for the updated packages");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote Red Hat host is missing one or more security updates.");
      script_set_attribute(attribute:"description", value:
    "The remote Redhat Enterprise Linux 7 host has packages installed that are affected by multiple vulnerabilities as
    referenced in the RHSA-2020:2289 advisory.
    
      - kernel: double free may be caused by the function
        allocate_trace_buffer in the file kernel/trace/trace.c
        (CVE-2017-18595)
    
      - kernel: Heap overflow in mwifiex_uap_parse_tail_ies
        function in drivers/net/wireless/marvell/mwifiex/ie.c
        (CVE-2019-10126)
    
      - kernel: use-after-free in __blk_add_trace in
        kernel/trace/blktrace.c (CVE-2019-19768)
    
      - kernel: Heap overflow in mwifiex_update_bss_desc_with_ie
        function in marvell/mwifiex/scan.c (CVE-2019-3846)
    
      - Kernel: NetLabel: null pointer dereference while
        receiving CIPSO packet with null category may cause
        kernel panic (CVE-2020-10711)
    
    Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
    number.");
      script_set_attribute(attribute:"see_also", value:"https://cwe.mitre.org/data/definitions/416.html");
      script_set_attribute(attribute:"see_also", value:"https://cwe.mitre.org/data/definitions/122.html");
      script_set_attribute(attribute:"see_also", value:"https://cwe.mitre.org/data/definitions/416.html");
      script_set_attribute(attribute:"see_also", value:"https://cwe.mitre.org/data/definitions/122.html");
      script_set_attribute(attribute:"see_also", value:"https://cwe.mitre.org/data/definitions/476.html");
      script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2020:2289");
      script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/CVE-2017-18595");
      script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/CVE-2019-10126");
      script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/CVE-2019-19768");
      script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/CVE-2019-3846");
      script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/CVE-2020-10711");
      script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/1713059");
      script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/1716992");
      script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/1758671");
      script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/1786164");
      script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/1825116");
      script_set_attribute(attribute:"solution", value:
    "Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-3846");
    
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_cwe_id(122, 416, 476);
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2019/06/03");
      script_set_attribute(attribute:"patch_publication_date", value:"2020/05/26");
      script_set_attribute(attribute:"plugin_publication_date", value:"2020/06/03");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7.6");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:rhel_eus:7.6");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:rhel_eus:7.6::computenode");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:rhel_eus:7.6::server");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:bpftool");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-bootwrapper");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-debug");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-doc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-headers");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-kdump");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-tools");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:perf");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:python-perf");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Red Hat Local Security Checks");
    
      script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("ssh_get_info.nasl", "linux_alt_patch_detect.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include('audit.inc');
    include('global_settings.inc');
    include('misc_func.inc');
    include('rpm.inc');
    include('ksplice.inc');
    
    if (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item('Host/RedHat/release');
    if (isnull(release) || 'Red Hat' >!< release) audit(AUDIT_OS_NOT, 'Red Hat');
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Red Hat');
    os_ver = os_ver[1];
    if (! preg(pattern:"^7\.6([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, 'Red Hat 7.6', 'Red Hat ' + os_ver);
    
    if (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item('Host/cpu');
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Red Hat', cpu);
    
    if (get_one_kb_item('Host/ksplice/kernel-cves'))
    {
      rm_kb_item(name:'Host/uptrack-uname-r');
      cve_list = make_list('CVE-2017-18595', 'CVE-2019-3846', 'CVE-2019-10126', 'CVE-2019-19768', 'CVE-2020-10711');
      if (ksplice_cves_check(cve_list))
      {
        audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for RHSA-2020:2289');
      }
      else
      {
        __rpm_report = ksplice_reporting_text();
      }
    }
    
    pkgs = [
        {'reference':'bpftool-3.10.0-957.54.1.el7', 'sp':'6', 'cpu':'x86_64', 'release':'7'},
        {'reference':'kernel-3.10.0-957.54.1.el7', 'sp':'6', 'cpu':'s390x', 'release':'7'},
        {'reference':'kernel-3.10.0-957.54.1.el7', 'sp':'6', 'cpu':'x86_64', 'release':'7'},
        {'reference':'kernel-abi-whitelists-3.10.0-957.54.1.el7', 'sp':'6', 'release':'7'},
        {'reference':'kernel-debug-3.10.0-957.54.1.el7', 'sp':'6', 'cpu':'s390x', 'release':'7'},
        {'reference':'kernel-debug-3.10.0-957.54.1.el7', 'sp':'6', 'cpu':'x86_64', 'release':'7'},
        {'reference':'kernel-debug-devel-3.10.0-957.54.1.el7', 'sp':'6', 'cpu':'s390x', 'release':'7'},
        {'reference':'kernel-debug-devel-3.10.0-957.54.1.el7', 'sp':'6', 'cpu':'x86_64', 'release':'7'},
        {'reference':'kernel-devel-3.10.0-957.54.1.el7', 'sp':'6', 'cpu':'s390x', 'release':'7'},
        {'reference':'kernel-devel-3.10.0-957.54.1.el7', 'sp':'6', 'cpu':'x86_64', 'release':'7'},
        {'reference':'kernel-headers-3.10.0-957.54.1.el7', 'sp':'6', 'cpu':'s390x', 'release':'7'},
        {'reference':'kernel-headers-3.10.0-957.54.1.el7', 'sp':'6', 'cpu':'x86_64', 'release':'7'},
        {'reference':'kernel-kdump-3.10.0-957.54.1.el7', 'sp':'6', 'cpu':'s390x', 'release':'7'},
        {'reference':'kernel-kdump-devel-3.10.0-957.54.1.el7', 'sp':'6', 'cpu':'s390x', 'release':'7'},
        {'reference':'kernel-tools-3.10.0-957.54.1.el7', 'sp':'6', 'cpu':'x86_64', 'release':'7'},
        {'reference':'kernel-tools-libs-3.10.0-957.54.1.el7', 'sp':'6', 'cpu':'x86_64', 'release':'7'},
        {'reference':'kernel-tools-libs-devel-3.10.0-957.54.1.el7', 'sp':'6', 'cpu':'x86_64', 'release':'7'},
        {'reference':'perf-3.10.0-957.54.1.el7', 'sp':'6', 'cpu':'s390x', 'release':'7'},
        {'reference':'perf-3.10.0-957.54.1.el7', 'sp':'6', 'cpu':'x86_64', 'release':'7'},
        {'reference':'python-perf-3.10.0-957.54.1.el7', 'sp':'6', 'cpu':'s390x', 'release':'7'},
        {'reference':'python-perf-3.10.0-957.54.1.el7', 'sp':'6', 'cpu':'x86_64', 'release':'7'}
    ];
    
    flag = 0;
    foreach package_array ( pkgs ) {
      reference = NULL;
      release = NULL;
      sp = NULL;
      cpu = NULL;
      el_string = NULL;
      rpm_spec_vers_cmp = NULL;
      epoch = NULL;
      allowmaj = NULL;
      if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];
      if (!empty_or_null(package_array['release'])) release = 'RHEL' + package_array['release'];
      if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];
      if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];
      if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];
      if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];
      if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];
      if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];
      if (reference && release) {
        if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;
      }
    }
    
    if (flag)
    {
      security_report_v4(
          port       : 0,
          severity   : SECURITY_HOLE,
          extra      : rpm_report_get() + redhat_report_package_caveat()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'bpftool / kernel / kernel-abi-whitelists / etc');
    }
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2020-2429.NASL
    descriptionThe remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:2429 advisory. - kernel: powerpc: incomplete Spectre-RSB mitigation leads to information exposure (CVE-2019-18660) - Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic (CVE-2020-10711) - Kernel: s390: page table upgrade in secondary address mode may lead to privilege escalation (CVE-2020-11884) - kernel: use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body (CVE-2020-12657) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-12
    modified2020-06-09
    plugin id137275
    published2020-06-09
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/137275
    titleRHEL 8 : kernel (RHSA-2020:2429)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2020-2103.NASL
    descriptionThe remote Redhat Enterprise Linux 6 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2020:2103 advisory. - Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic (CVE-2020-10711) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-05-31
    modified2020-05-12
    plugin id136523
    published2020-05-12
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/136523
    titleRHEL 6 : kernel (RHSA-2020:2103)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2020-2214.NASL
    descriptionThe remote Redhat Enterprise Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:2214 advisory. - kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c (CVE-2017-18595) - kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c (CVE-2019-19768) - Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic (CVE-2020-10711) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-05-31
    modified2020-05-20
    plugin id136714
    published2020-05-20
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/136714
    titleRHEL 7 : kernel (RHSA-2020:2214)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2020-2082.NASL
    descriptionThe remote Redhat Enterprise Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:2082 advisory. - kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c (CVE-2017-18595) - kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c (CVE-2019-19768) - Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic (CVE-2020-10711) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-05-15
    modified2020-05-12
    plugin id136518
    published2020-05-12
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/136518
    titleRHEL 7 : kernel (RHSA-2020:2082)
  • NASL familyPhotonOS Local Security Checks
    NASL idPHOTONOS_PHSA-2020-3_0-0089_LINUX.NASL
    descriptionAn update of the linux package has been released.
    last seen2020-06-12
    modified2020-05-13
    plugin id136579
    published2020-05-13
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/136579
    titlePhoton OS 3.0: Linux PHSA-2020-3.0-0089
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2020-2102.NASL
    descriptionFrom Red Hat Security Advisory 2020:2102 : The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:2102 advisory. - Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic (CVE-2020-10711) - Kernel: s390: page table upgrade in secondary address mode may lead to privilege escalation (CVE-2020-11884) - Kernel: kvm: nVMX: L2 guest may trick the L0 hypervisor to access sensitive L1 resources (CVE-2020-2732) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-06
    modified2020-05-15
    plugin id136646
    published2020-05-15
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/136646
    titleOracle Linux 8 : kernel (ELSA-2020-2102)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20200512_KERNEL_ON_SL6_X.NASL
    descriptionSecurity Fix(es) : - Kernel: NetLabel: NULL pointer dereference while receiving CIPSO packet with null category may cause kernel panic (CVE-2020-10711)
    last seen2020-06-06
    modified2020-05-14
    plugin id136603
    published2020-05-14
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/136603
    titleScientific Linux Security Update : kernel on SL6.x i386/x86_64 (20200512)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2020-2242.NASL
    descriptionThe remote Redhat Enterprise Linux 6 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:2242 advisory. - kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c (CVE-2017-18595) - kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c (CVE-2019-19768) - Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic (CVE-2020-10711) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-05-31
    modified2020-05-20
    plugin id136737
    published2020-05-20
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/136737
    titleRHEL 6 : kernel-rt (RHSA-2020:2242)
  • NASL familyPhotonOS Local Security Checks
    NASL idPHOTONOS_PHSA-2020-2_0-0242_LINUX.NASL
    descriptionAn update of the linux package has been released.
    last seen2020-06-12
    modified2020-05-13
    plugin id136570
    published2020-05-13
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/136570
    titlePhoton OS 2.0: Linux PHSA-2020-2.0-0242
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2020-2522.NASL
    descriptionThe remote Redhat Enterprise Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:2522 advisory. - kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c (CVE-2017-18595) - kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS (CVE-2018-20169) - kernel: denial of service via ioctl call in network tun handling (CVE-2018-7191) - Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR (CVE-2019-10639) - kernel: unchecked kstrdup of fwstr in drm_load_edid_firmware leads to denial of service (CVE-2019-12382) - kernel: use-after-free in arch/x86/lib/insn-eval.c (CVE-2019-13233) - kernel: integer overflow and OOB read in drivers/block/floppy.c (CVE-2019-14283) - kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service (CVE-2019-15916) - kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c (CVE-2019-19768) - kernel: perf_event_open() and execve() race in setuid programs allows a data leak (CVE-2019-3901) - kernel: brcmfmac frame validation bypass (CVE-2019-9503) - Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic (CVE-2020-10711) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-12
    modified2020-06-11
    plugin id137363
    published2020-06-11
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/137363
    titleRHEL 7 : kernel (RHSA-2020:2522)
  • NASL familyPhotonOS Local Security Checks
    NASL idPHOTONOS_PHSA-2020-1_0-0293_LINUX.NASL
    descriptionAn update of the linux package has been released.
    last seen2020-06-12
    modified2020-05-13
    plugin id136550
    published2020-05-13
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/136550
    titlePhoton OS 1.0: Linux PHSA-2020-1.0-0293
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2020-2277.NASL
    descriptionThe remote Redhat Enterprise Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:2277 advisory. - kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c (CVE-2017-18595) - kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c (CVE-2019-19768) - Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic (CVE-2020-10711) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-05
    modified2020-06-03
    plugin id137062
    published2020-06-03
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/137062
    titleRHEL 7 : kernel (RHSA-2020:2277)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2020-2199.NASL
    descriptionThe remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:2199 advisory. - kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c (CVE-2019-19768) - Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic (CVE-2020-10711) - Kernel: s390: page table upgrade in secondary address mode may lead to privilege escalation (CVE-2020-11884) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-05-31
    modified2020-05-20
    plugin id136717
    published2020-05-20
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/136717
    titleRHEL 8 : kernel (RHSA-2020:2199)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2020-1592.NASL
    descriptionAccording to the versions of the kernel packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - A flaw was found in the Linux kernel
    last seen2020-06-11
    modified2020-05-26
    plugin id136870
    published2020-05-26
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/136870
    titleEulerOS 2.0 SP8 : kernel (EulerOS-SA-2020-1592)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2020-C6B9FFF7F8.NASL
    descriptionThe 5.6.13 stable kernel update contains a number of important fixes across the tree ---- The 5.6.12 stable update contains a number of important fixes across the tree. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-31
    modified2020-05-20
    plugin id136725
    published2020-05-20
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/136725
    titleFedora 31 : kernel (2020-c6b9fff7f8)
  • NASL familyAmazon Linux Local Security Checks
    NASL idALA_ALAS-2020-1366.NASL
    descriptionA NULL pointer dereference flaw was found in the Linux kernel
    last seen2020-06-06
    modified2020-05-15
    plugin id136627
    published2020-05-15
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/136627
    titleAmazon Linux AMI : kernel (ALAS-2020-1366)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-2242.NASL
    descriptionSeveral vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. CVE-2019-2182 Hanjun Guo and Lei Li reported a race condition in the arm64 virtual memory management code, which could lead to an information disclosure, denial of service (crash), or possibly privilege escalation. CVE-2019-5108 Mitchell Frank of Cisco discovered that when the IEEE 802.11 (WiFi) stack was used in AP mode with roaming, it would trigger roaming for a newly associated station before the station was authenticated. An attacker within range of the AP could use this to cause a denial of service, either by filling up a switching table or by redirecting traffic away from other stations. CVE-2019-19319 Jungyeon discovered that a crafted filesystem can cause the ext4 implementation to deallocate or reallocate journal blocks. A user permitted to mount filesystems could use this to cause a denial of service (crash), or possibly for privilege escalation. CVE-2019-19462 The syzbot tool found a missing error check in the
    last seen2020-06-12
    modified2020-06-11
    plugin id137339
    published2020-06-11
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/137339
    titleDebian DLA-2242-1 : linux-4.9 security update
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2020-2102.NASL
    descriptionThe remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:2102 advisory. - Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic (CVE-2020-10711) - Kernel: s390: page table upgrade in secondary address mode may lead to privilege escalation (CVE-2020-11884) - Kernel: kvm: nVMX: L2 guest may trick the L0 hypervisor to access sensitive L1 resources (CVE-2020-2732) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-05-15
    modified2020-05-12
    plugin id136526
    published2020-05-12
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/136526
    titleRHEL 8 : kernel (RHSA-2020:2102)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2020-2285.NASL
    descriptionThe remote Redhat Enterprise Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:2285 advisory. - kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c (CVE-2017-18595) - kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c (CVE-2019-19768) - Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic (CVE-2020-10711) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-05
    modified2020-06-03
    plugin id137061
    published2020-06-03
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/137061
    titleRHEL 7 : kernel (RHSA-2020:2285)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20200512_KERNEL_ON_SL7_X.NASL
    descriptionSecurity Fix(es) : - kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c (CVE-2017-18595) - kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c (CVE-2019-19768) - Kernel: NetLabel: NULL pointer dereference while receiving CIPSO packet with null category may cause kernel panic (CVE-2020-10711)
    last seen2020-05-22
    modified2020-05-18
    plugin id136690
    published2020-05-18
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/136690
    titleScientific Linux Security Update : kernel on SL7.x x86_64 (20200512)
  • NASL familyVirtuozzo Local Security Checks
    NASL idVIRTUOZZO_VZA-2020-037.NASL
    descriptionAccording to the versions of the parallels-server-bm-release / vzkernel / etc packages installed, the Virtuozzo installation on the remote host is affected by the following vulnerabilities : - Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic. - kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow. - kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c. - kernel: out-of-bounds write in mpol_parse_str function in mm/mempolicy.c. - kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c. - kernel: unprivileged users able to create RAW sockets in AF_ISDN network protocol. - kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service. - kernel: offset2lib allows for the stack guard page to be jumped over. Note that Tenable Network Security has extracted the preceding description block directly from the Virtuozzo security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-31
    modified2020-05-22
    plugin id136804
    published2020-05-22
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/136804
    titleVirtuozzo 6 : parallels-server-bm-release / vzkernel / etc (VZA-2020-037)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2020-2082.NASL
    descriptionFrom Red Hat Security Advisory 2020:2082 : The remote Redhat Enterprise Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:2082 advisory. - kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c (CVE-2017-18595) - kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c (CVE-2019-19768) - Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic (CVE-2020-10711) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-06
    modified2020-05-15
    plugin id136645
    published2020-05-15
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/136645
    titleOracle Linux 7 : kernel (ELSA-2020-2082)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2020-5A69DECC0C.NASL
    descriptionThe 5.6.13 stable kernel update contains a number of important fixes across the tree ---- The 5.6.12 stable update contains a number of important fixes across the tree. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-31
    modified2020-05-20
    plugin id136722
    published2020-05-20
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/136722
    titleFedora 30 : kernel (2020-5a69decc0c)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-4698.NASL
    descriptionSeveral vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. - CVE-2019-2182 Hanjun Guo and Lei Li reported a race condition in the arm64 virtual memory management code, which could lead to an information disclosure, denial of service (crash), or possibly privilege escalation. - CVE-2019-5108 Mitchell Frank of Cisco discovered that when the IEEE 802.11 (WiFi) stack was used in AP mode with roaming, it would trigger roaming for a newly associated station before the station was authenticated. An attacker within range of the AP could use this to cause a denial of service, either by filling up a switching table or by redirecting traffic away from other stations. - CVE-2019-19319 Jungyeon discovered that a crafted filesystem can cause the ext4 implementation to deallocate or reallocate journal blocks. A user permitted to mount filesystems could use this to cause a denial of service (crash), or possibly for privilege escalation. - CVE-2019-19462 The syzbot tool found a missing error check in the
    last seen2020-06-12
    modified2020-06-11
    plugin id137340
    published2020-06-11
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/137340
    titleDebian DSA-4698-1 : linux - security update
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2020-2103.NASL
    descriptionThe remote Redhat Enterprise Linux 6 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2020:2103 advisory. - Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic (CVE-2020-10711) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-06
    modified2020-05-22
    plugin id136777
    published2020-05-22
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/136777
    titleCentOS 6 : kernel (CESA-2020:2103)
  • NASL familyAmazon Linux Local Security Checks
    NASL idAL2_ALAS-2020-1425.NASL
    descriptionA NULL pointer dereference flaw was found in the Linux kernel
    last seen2020-06-06
    modified2020-05-13
    plugin id136530
    published2020-05-13
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/136530
    titleAmazon Linux 2 : kernel (ALAS-2020-1425)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-4699.NASL
    descriptionSeveral vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. - CVE-2019-3016 It was discovered that the KVM implementation for x86 did not always perform TLB flushes when needed, if the paravirtualised TLB flush feature was enabled. This could lead to disclosure of sensitive information within a guest VM. - CVE-2019-19462 The syzkaller tool found a missing error check in the
    last seen2020-06-12
    modified2020-06-11
    plugin id137341
    published2020-06-11
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/137341
    titleDebian DSA-4699-1 : linux - security update
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2020-2171.NASL
    descriptionThe remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:2171 advisory. - Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic (CVE-2020-10711) - Kernel: kvm: nVMX: L2 guest may trick the L0 hypervisor to access sensitive L1 resources (CVE-2020-2732) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-05-18
    modified2020-05-15
    plugin id136611
    published2020-05-15
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/136611
    titleRHEL 8 : kernel-rt (RHSA-2020:2171)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2020-2104.NASL
    descriptionThe remote Redhat Enterprise Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:2104 advisory. - kernel: out of bounds write in function i2c_smbus_xfer_emulated in drivers/i2c/i2c-core-smbus.c (CVE-2017-18551) - kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c (CVE-2017-18595) - kernel: null pointer dereference in dlpar_parse_cc_property in arch/powerrc/platforms/pseries/dlpar.c causing denial of service (CVE-2019-12614) - kernel: denial of service in in xfs_setattr_nonsize in fs/xfs/xfs_iops.c (CVE-2019-15538) - kernel: mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c (CVE-2019-19447) - kernel: a malicious USB device in the drivers/input/ff- memless.c leads to use-after-free (CVE-2019-19524) - kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c (CVE-2019-19768) - kernel: out of bounds write in i2c driver leads to local escalation of privilege (CVE-2019-9454) - Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic (CVE-2020-10711) - kernel: out-of-bounds read in set_fdc in drivers/block/floppy.c (CVE-2020-9383) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-05-15
    modified2020-05-12
    plugin id136496
    published2020-05-12
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/136496
    titleRHEL 7 : kernel-alt (RHSA-2020:2104)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2020-2085.NASL
    descriptionThe remote Redhat Enterprise Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:2085 advisory. - kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c (CVE-2017-18595) - kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c (CVE-2019-19768) - Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic (CVE-2020-10711) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-05-15
    modified2020-05-12
    plugin id136525
    published2020-05-12
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/136525
    titleRHEL 7 : kernel-rt (RHSA-2020:2085)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2020-2103.NASL
    descriptionFrom Red Hat Security Advisory 2020:2103 : The remote Redhat Enterprise Linux 6 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2020:2103 advisory. - Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic (CVE-2020-10711) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-06
    modified2020-05-14
    plugin id136602
    published2020-05-14
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/136602
    titleOracle Linux 6 : kernel (ELSA-2020-2103)
  • NASL familySlackware Local Security Checks
    NASL idSLACKWARE_SSA_2020-163-01.NASL
    descriptionNew kernel packages are available for Slackware 14.2 to fix security issues.
    last seen2020-06-13
    modified2020-06-12
    plugin id137391
    published2020-06-12
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/137391
    titleSlackware 14.2 : Slackware 14.2 kernel (SSA:2020-163-01)

Redhat

advisories
  • bugzilla
    id1825116
    titleCVE-2020-10711 Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 7 is installed
        ovaloval:com.redhat.rhba:tst:20150364027
      • OR
        • commentkernel earlier than 0:3.10.0-1127.8.2.el7 is currently running
          ovaloval:com.redhat.rhsa:tst:20202082033
        • commentkernel earlier than 0:3.10.0-1127.8.2.el7 is set to boot up on next boot
          ovaloval:com.redhat.rhsa:tst:20202082034
      • OR
        • AND
          • commentkernel-tools-libs-devel is earlier than 0:3.10.0-1127.8.2.el7
            ovaloval:com.redhat.rhsa:tst:20202082001
          • commentkernel-tools-libs-devel is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140678022
        • AND
          • commentkernel-debug-devel is earlier than 0:3.10.0-1127.8.2.el7
            ovaloval:com.redhat.rhsa:tst:20202082003
          • commentkernel-debug-devel is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100842008
        • AND
          • commentkernel-doc is earlier than 0:3.10.0-1127.8.2.el7
            ovaloval:com.redhat.rhsa:tst:20202082005
          • commentkernel-doc is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100842002
        • AND
          • commentkernel-abi-whitelists is earlier than 0:3.10.0-1127.8.2.el7
            ovaloval:com.redhat.rhsa:tst:20202082007
          • commentkernel-abi-whitelists is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20131645022
        • AND
          • commentpython-perf is earlier than 0:3.10.0-1127.8.2.el7
            ovaloval:com.redhat.rhsa:tst:20202082009
          • commentpython-perf is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20111530024
        • AND
          • commentperf is earlier than 0:3.10.0-1127.8.2.el7
            ovaloval:com.redhat.rhsa:tst:20202082011
          • commentperf is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100842006
        • AND
          • commentkernel-tools-libs is earlier than 0:3.10.0-1127.8.2.el7
            ovaloval:com.redhat.rhsa:tst:20202082013
          • commentkernel-tools-libs is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140678016
        • AND
          • commentkernel-tools is earlier than 0:3.10.0-1127.8.2.el7
            ovaloval:com.redhat.rhsa:tst:20202082015
          • commentkernel-tools is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20140678012
        • AND
          • commentkernel-headers is earlier than 0:3.10.0-1127.8.2.el7
            ovaloval:com.redhat.rhsa:tst:20202082017
          • commentkernel-headers is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100842010
        • AND
          • commentkernel-devel is earlier than 0:3.10.0-1127.8.2.el7
            ovaloval:com.redhat.rhsa:tst:20202082019
          • commentkernel-devel is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100842016
        • AND
          • commentkernel-debug is earlier than 0:3.10.0-1127.8.2.el7
            ovaloval:com.redhat.rhsa:tst:20202082021
          • commentkernel-debug is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100842014
        • AND
          • commentkernel is earlier than 0:3.10.0-1127.8.2.el7
            ovaloval:com.redhat.rhsa:tst:20202082023
          • commentkernel is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100842012
        • AND
          • commentbpftool is earlier than 0:3.10.0-1127.8.2.el7
            ovaloval:com.redhat.rhsa:tst:20202082025
          • commentbpftool is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20183083026
        • AND
          • commentkernel-bootwrapper is earlier than 0:3.10.0-1127.8.2.el7
            ovaloval:com.redhat.rhsa:tst:20202082027
          • commentkernel-bootwrapper is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100842018
        • AND
          • commentkernel-kdump-devel is earlier than 0:3.10.0-1127.8.2.el7
            ovaloval:com.redhat.rhsa:tst:20202082029
          • commentkernel-kdump-devel is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100842022
        • AND
          • commentkernel-kdump is earlier than 0:3.10.0-1127.8.2.el7
            ovaloval:com.redhat.rhsa:tst:20202082031
          • commentkernel-kdump is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100842020
    rhsa
    idRHSA-2020:2082
    released2020-05-12
    severityImportant
    titleRHSA-2020:2082: kernel security and bug fix update (Important)
  • bugzilla
    id1825116
    titleCVE-2020-10711 Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 7 is installed
        ovaloval:com.redhat.rhba:tst:20150364027
      • OR
        • AND
          • commentkernel-rt-doc is earlier than 0:3.10.0-1127.8.2.rt56.1103.el7
            ovaloval:com.redhat.rhsa:tst:20202085001
          • commentkernel-rt-doc is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20150727002
        • AND
          • commentkernel-rt-trace-devel is earlier than 0:3.10.0-1127.8.2.rt56.1103.el7
            ovaloval:com.redhat.rhsa:tst:20202085003
          • commentkernel-rt-trace-devel is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20150727004
        • AND
          • commentkernel-rt-trace is earlier than 0:3.10.0-1127.8.2.rt56.1103.el7
            ovaloval:com.redhat.rhsa:tst:20202085005
          • commentkernel-rt-trace is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20150727008
        • AND
          • commentkernel-rt-devel is earlier than 0:3.10.0-1127.8.2.rt56.1103.el7
            ovaloval:com.redhat.rhsa:tst:20202085007
          • commentkernel-rt-devel is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20150727012
        • AND
          • commentkernel-rt-debug-devel is earlier than 0:3.10.0-1127.8.2.rt56.1103.el7
            ovaloval:com.redhat.rhsa:tst:20202085009
          • commentkernel-rt-debug-devel is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20150727010
        • AND
          • commentkernel-rt-debug is earlier than 0:3.10.0-1127.8.2.rt56.1103.el7
            ovaloval:com.redhat.rhsa:tst:20202085011
          • commentkernel-rt-debug is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20150727014
        • AND
          • commentkernel-rt is earlier than 0:3.10.0-1127.8.2.rt56.1103.el7
            ovaloval:com.redhat.rhsa:tst:20202085013
          • commentkernel-rt is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20150727006
        • AND
          • commentkernel-rt-trace-kvm is earlier than 0:3.10.0-1127.8.2.rt56.1103.el7
            ovaloval:com.redhat.rhsa:tst:20202085015
          • commentkernel-rt-trace-kvm is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20160212016
        • AND
          • commentkernel-rt-kvm is earlier than 0:3.10.0-1127.8.2.rt56.1103.el7
            ovaloval:com.redhat.rhsa:tst:20202085017
          • commentkernel-rt-kvm is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20160212018
        • AND
          • commentkernel-rt-debug-kvm is earlier than 0:3.10.0-1127.8.2.rt56.1103.el7
            ovaloval:com.redhat.rhsa:tst:20202085019
          • commentkernel-rt-debug-kvm is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20160212020
    rhsa
    idRHSA-2020:2085
    released2020-05-12
    severityImportant
    titleRHSA-2020:2085: kernel-rt security and bug fix update (Important)
  • bugzilla
    id1825116
    titleCVE-2020-10711 Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 6 is installed
        ovaloval:com.redhat.rhba:tst:20111656003
      • OR
        • commentkernel earlier than 0:2.6.32-754.29.2.el6 is currently running
          ovaloval:com.redhat.rhsa:tst:20202103027
        • commentkernel earlier than 0:2.6.32-754.29.2.el6 is set to boot up on next boot
          ovaloval:com.redhat.rhsa:tst:20202103028
      • OR
        • AND
          • commentkernel-firmware is earlier than 0:2.6.32-754.29.2.el6
            ovaloval:com.redhat.rhsa:tst:20202103001
          • commentkernel-firmware is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100842004
        • AND
          • commentkernel-doc is earlier than 0:2.6.32-754.29.2.el6
            ovaloval:com.redhat.rhsa:tst:20202103003
          • commentkernel-doc is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100842002
        • AND
          • commentkernel-abi-whitelists is earlier than 0:2.6.32-754.29.2.el6
            ovaloval:com.redhat.rhsa:tst:20202103005
          • commentkernel-abi-whitelists is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20131645022
        • AND
          • commentperf is earlier than 0:2.6.32-754.29.2.el6
            ovaloval:com.redhat.rhsa:tst:20202103007
          • commentperf is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100842006
        • AND
          • commentkernel-headers is earlier than 0:2.6.32-754.29.2.el6
            ovaloval:com.redhat.rhsa:tst:20202103009
          • commentkernel-headers is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100842010
        • AND
          • commentkernel-devel is earlier than 0:2.6.32-754.29.2.el6
            ovaloval:com.redhat.rhsa:tst:20202103011
          • commentkernel-devel is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100842016
        • AND
          • commentkernel-debug-devel is earlier than 0:2.6.32-754.29.2.el6
            ovaloval:com.redhat.rhsa:tst:20202103013
          • commentkernel-debug-devel is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100842008
        • AND
          • commentkernel-debug is earlier than 0:2.6.32-754.29.2.el6
            ovaloval:com.redhat.rhsa:tst:20202103015
          • commentkernel-debug is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100842014
        • AND
          • commentkernel is earlier than 0:2.6.32-754.29.2.el6
            ovaloval:com.redhat.rhsa:tst:20202103017
          • commentkernel is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100842012
        • AND
          • commentpython-perf is earlier than 0:2.6.32-754.29.2.el6
            ovaloval:com.redhat.rhsa:tst:20202103019
          • commentpython-perf is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20111530024
        • AND
          • commentkernel-bootwrapper is earlier than 0:2.6.32-754.29.2.el6
            ovaloval:com.redhat.rhsa:tst:20202103021
          • commentkernel-bootwrapper is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100842018
        • AND
          • commentkernel-kdump-devel is earlier than 0:2.6.32-754.29.2.el6
            ovaloval:com.redhat.rhsa:tst:20202103023
          • commentkernel-kdump-devel is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100842022
        • AND
          • commentkernel-kdump is earlier than 0:2.6.32-754.29.2.el6
            ovaloval:com.redhat.rhsa:tst:20202103025
          • commentkernel-kdump is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100842020
    rhsa
    idRHSA-2020:2103
    released2020-05-12
    severityImportant
    titleRHSA-2020:2103: kernel security update (Important)
rpms
  • bpftool-0:3.10.0-1127.8.2.el7
  • bpftool-debuginfo-0:3.10.0-1127.8.2.el7
  • kernel-0:3.10.0-1127.8.2.el7
  • kernel-abi-whitelists-0:3.10.0-1127.8.2.el7
  • kernel-bootwrapper-0:3.10.0-1127.8.2.el7
  • kernel-debug-0:3.10.0-1127.8.2.el7
  • kernel-debug-debuginfo-0:3.10.0-1127.8.2.el7
  • kernel-debug-devel-0:3.10.0-1127.8.2.el7
  • kernel-debuginfo-0:3.10.0-1127.8.2.el7
  • kernel-debuginfo-common-ppc64-0:3.10.0-1127.8.2.el7
  • kernel-debuginfo-common-ppc64le-0:3.10.0-1127.8.2.el7
  • kernel-debuginfo-common-s390x-0:3.10.0-1127.8.2.el7
  • kernel-debuginfo-common-x86_64-0:3.10.0-1127.8.2.el7
  • kernel-devel-0:3.10.0-1127.8.2.el7
  • kernel-doc-0:3.10.0-1127.8.2.el7
  • kernel-headers-0:3.10.0-1127.8.2.el7
  • kernel-kdump-0:3.10.0-1127.8.2.el7
  • kernel-kdump-debuginfo-0:3.10.0-1127.8.2.el7
  • kernel-kdump-devel-0:3.10.0-1127.8.2.el7
  • kernel-tools-0:3.10.0-1127.8.2.el7
  • kernel-tools-debuginfo-0:3.10.0-1127.8.2.el7
  • kernel-tools-libs-0:3.10.0-1127.8.2.el7
  • kernel-tools-libs-devel-0:3.10.0-1127.8.2.el7
  • perf-0:3.10.0-1127.8.2.el7
  • perf-debuginfo-0:3.10.0-1127.8.2.el7
  • python-perf-0:3.10.0-1127.8.2.el7
  • python-perf-debuginfo-0:3.10.0-1127.8.2.el7
  • kernel-rt-0:3.10.0-1127.8.2.rt56.1103.el7
  • kernel-rt-debug-0:3.10.0-1127.8.2.rt56.1103.el7
  • kernel-rt-debug-debuginfo-0:3.10.0-1127.8.2.rt56.1103.el7
  • kernel-rt-debug-devel-0:3.10.0-1127.8.2.rt56.1103.el7
  • kernel-rt-debug-kvm-0:3.10.0-1127.8.2.rt56.1103.el7
  • kernel-rt-debug-kvm-debuginfo-0:3.10.0-1127.8.2.rt56.1103.el7
  • kernel-rt-debuginfo-0:3.10.0-1127.8.2.rt56.1103.el7
  • kernel-rt-debuginfo-common-x86_64-0:3.10.0-1127.8.2.rt56.1103.el7
  • kernel-rt-devel-0:3.10.0-1127.8.2.rt56.1103.el7
  • kernel-rt-doc-0:3.10.0-1127.8.2.rt56.1103.el7
  • kernel-rt-kvm-0:3.10.0-1127.8.2.rt56.1103.el7
  • kernel-rt-kvm-debuginfo-0:3.10.0-1127.8.2.rt56.1103.el7
  • kernel-rt-trace-0:3.10.0-1127.8.2.rt56.1103.el7
  • kernel-rt-trace-debuginfo-0:3.10.0-1127.8.2.rt56.1103.el7
  • kernel-rt-trace-devel-0:3.10.0-1127.8.2.rt56.1103.el7
  • kernel-rt-trace-kvm-0:3.10.0-1127.8.2.rt56.1103.el7
  • kernel-rt-trace-kvm-debuginfo-0:3.10.0-1127.8.2.rt56.1103.el7
  • bpftool-0:4.18.0-193.1.2.el8_2
  • bpftool-debuginfo-0:4.18.0-193.1.2.el8_2
  • kernel-0:4.18.0-193.1.2.el8_2
  • kernel-abi-whitelists-0:4.18.0-193.1.2.el8_2
  • kernel-core-0:4.18.0-193.1.2.el8_2
  • kernel-cross-headers-0:4.18.0-193.1.2.el8_2
  • kernel-debug-0:4.18.0-193.1.2.el8_2
  • kernel-debug-core-0:4.18.0-193.1.2.el8_2
  • kernel-debug-debuginfo-0:4.18.0-193.1.2.el8_2
  • kernel-debug-devel-0:4.18.0-193.1.2.el8_2
  • kernel-debug-modules-0:4.18.0-193.1.2.el8_2
  • kernel-debug-modules-extra-0:4.18.0-193.1.2.el8_2
  • kernel-debuginfo-0:4.18.0-193.1.2.el8_2
  • kernel-debuginfo-common-aarch64-0:4.18.0-193.1.2.el8_2
  • kernel-debuginfo-common-ppc64le-0:4.18.0-193.1.2.el8_2
  • kernel-debuginfo-common-s390x-0:4.18.0-193.1.2.el8_2
  • kernel-debuginfo-common-x86_64-0:4.18.0-193.1.2.el8_2
  • kernel-devel-0:4.18.0-193.1.2.el8_2
  • kernel-doc-0:4.18.0-193.1.2.el8_2
  • kernel-headers-0:4.18.0-193.1.2.el8_2
  • kernel-modules-0:4.18.0-193.1.2.el8_2
  • kernel-modules-extra-0:4.18.0-193.1.2.el8_2
  • kernel-tools-0:4.18.0-193.1.2.el8_2
  • kernel-tools-debuginfo-0:4.18.0-193.1.2.el8_2
  • kernel-tools-libs-0:4.18.0-193.1.2.el8_2
  • kernel-tools-libs-devel-0:4.18.0-193.1.2.el8_2
  • kernel-zfcpdump-0:4.18.0-193.1.2.el8_2
  • kernel-zfcpdump-core-0:4.18.0-193.1.2.el8_2
  • kernel-zfcpdump-debuginfo-0:4.18.0-193.1.2.el8_2
  • kernel-zfcpdump-devel-0:4.18.0-193.1.2.el8_2
  • kernel-zfcpdump-modules-0:4.18.0-193.1.2.el8_2
  • kernel-zfcpdump-modules-extra-0:4.18.0-193.1.2.el8_2
  • perf-0:4.18.0-193.1.2.el8_2
  • perf-debuginfo-0:4.18.0-193.1.2.el8_2
  • python3-perf-0:4.18.0-193.1.2.el8_2
  • python3-perf-debuginfo-0:4.18.0-193.1.2.el8_2
  • kernel-0:2.6.32-754.29.2.el6
  • kernel-abi-whitelists-0:2.6.32-754.29.2.el6
  • kernel-bootwrapper-0:2.6.32-754.29.2.el6
  • kernel-debug-0:2.6.32-754.29.2.el6
  • kernel-debug-debuginfo-0:2.6.32-754.29.2.el6
  • kernel-debug-devel-0:2.6.32-754.29.2.el6
  • kernel-debuginfo-0:2.6.32-754.29.2.el6
  • kernel-debuginfo-common-i686-0:2.6.32-754.29.2.el6
  • kernel-debuginfo-common-ppc64-0:2.6.32-754.29.2.el6
  • kernel-debuginfo-common-s390x-0:2.6.32-754.29.2.el6
  • kernel-debuginfo-common-x86_64-0:2.6.32-754.29.2.el6
  • kernel-devel-0:2.6.32-754.29.2.el6
  • kernel-doc-0:2.6.32-754.29.2.el6
  • kernel-firmware-0:2.6.32-754.29.2.el6
  • kernel-headers-0:2.6.32-754.29.2.el6
  • kernel-kdump-0:2.6.32-754.29.2.el6
  • kernel-kdump-debuginfo-0:2.6.32-754.29.2.el6
  • kernel-kdump-devel-0:2.6.32-754.29.2.el6
  • perf-0:2.6.32-754.29.2.el6
  • perf-debuginfo-0:2.6.32-754.29.2.el6
  • python-perf-0:2.6.32-754.29.2.el6
  • python-perf-debuginfo-0:2.6.32-754.29.2.el6
  • kernel-0:4.14.0-115.21.2.el7a
  • kernel-abi-whitelists-0:4.14.0-115.21.2.el7a
  • kernel-bootwrapper-0:4.14.0-115.21.2.el7a
  • kernel-debug-0:4.14.0-115.21.2.el7a
  • kernel-debug-debuginfo-0:4.14.0-115.21.2.el7a
  • kernel-debug-devel-0:4.14.0-115.21.2.el7a
  • kernel-debuginfo-0:4.14.0-115.21.2.el7a
  • kernel-debuginfo-common-aarch64-0:4.14.0-115.21.2.el7a
  • kernel-debuginfo-common-ppc64le-0:4.14.0-115.21.2.el7a
  • kernel-debuginfo-common-s390x-0:4.14.0-115.21.2.el7a
  • kernel-devel-0:4.14.0-115.21.2.el7a
  • kernel-doc-0:4.14.0-115.21.2.el7a
  • kernel-headers-0:4.14.0-115.21.2.el7a
  • kernel-kdump-0:4.14.0-115.21.2.el7a
  • kernel-kdump-debuginfo-0:4.14.0-115.21.2.el7a
  • kernel-kdump-devel-0:4.14.0-115.21.2.el7a
  • kernel-tools-0:4.14.0-115.21.2.el7a
  • kernel-tools-debuginfo-0:4.14.0-115.21.2.el7a
  • kernel-tools-libs-0:4.14.0-115.21.2.el7a
  • kernel-tools-libs-devel-0:4.14.0-115.21.2.el7a
  • perf-0:4.14.0-115.21.2.el7a
  • perf-debuginfo-0:4.14.0-115.21.2.el7a
  • python-perf-0:4.14.0-115.21.2.el7a
  • python-perf-debuginfo-0:4.14.0-115.21.2.el7a
  • kpatch-patch-4_18_0-193-0:1-2.el8
  • kpatch-patch-4_18_0-193-debuginfo-0:1-2.el8
  • kpatch-patch-4_18_0-193-debugsource-0:1-2.el8
  • kernel-rt-0:4.18.0-193.1.2.rt13.53.el8_2
  • kernel-rt-core-0:4.18.0-193.1.2.rt13.53.el8_2
  • kernel-rt-debug-0:4.18.0-193.1.2.rt13.53.el8_2
  • kernel-rt-debug-core-0:4.18.0-193.1.2.rt13.53.el8_2
  • kernel-rt-debug-debuginfo-0:4.18.0-193.1.2.rt13.53.el8_2
  • kernel-rt-debug-devel-0:4.18.0-193.1.2.rt13.53.el8_2
  • kernel-rt-debug-kvm-0:4.18.0-193.1.2.rt13.53.el8_2
  • kernel-rt-debug-modules-0:4.18.0-193.1.2.rt13.53.el8_2
  • kernel-rt-debug-modules-extra-0:4.18.0-193.1.2.rt13.53.el8_2
  • kernel-rt-debuginfo-0:4.18.0-193.1.2.rt13.53.el8_2
  • kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.1.2.rt13.53.el8_2
  • kernel-rt-devel-0:4.18.0-193.1.2.rt13.53.el8_2
  • kernel-rt-kvm-0:4.18.0-193.1.2.rt13.53.el8_2
  • kernel-rt-modules-0:4.18.0-193.1.2.rt13.53.el8_2
  • kernel-rt-modules-extra-0:4.18.0-193.1.2.rt13.53.el8_2
  • bpftool-0:4.18.0-147.13.2.el8_1
  • bpftool-debuginfo-0:4.18.0-147.13.2.el8_1
  • kernel-0:4.18.0-147.13.2.el8_1
  • kernel-abi-whitelists-0:4.18.0-147.13.2.el8_1
  • kernel-core-0:4.18.0-147.13.2.el8_1
  • kernel-cross-headers-0:4.18.0-147.13.2.el8_1
  • kernel-debug-0:4.18.0-147.13.2.el8_1
  • kernel-debug-core-0:4.18.0-147.13.2.el8_1
  • kernel-debug-debuginfo-0:4.18.0-147.13.2.el8_1
  • kernel-debug-devel-0:4.18.0-147.13.2.el8_1
  • kernel-debug-modules-0:4.18.0-147.13.2.el8_1
  • kernel-debug-modules-extra-0:4.18.0-147.13.2.el8_1
  • kernel-debuginfo-0:4.18.0-147.13.2.el8_1
  • kernel-debuginfo-common-aarch64-0:4.18.0-147.13.2.el8_1
  • kernel-debuginfo-common-ppc64le-0:4.18.0-147.13.2.el8_1
  • kernel-debuginfo-common-s390x-0:4.18.0-147.13.2.el8_1
  • kernel-debuginfo-common-x86_64-0:4.18.0-147.13.2.el8_1
  • kernel-devel-0:4.18.0-147.13.2.el8_1
  • kernel-doc-0:4.18.0-147.13.2.el8_1
  • kernel-headers-0:4.18.0-147.13.2.el8_1
  • kernel-modules-0:4.18.0-147.13.2.el8_1
  • kernel-modules-extra-0:4.18.0-147.13.2.el8_1
  • kernel-tools-0:4.18.0-147.13.2.el8_1
  • kernel-tools-debuginfo-0:4.18.0-147.13.2.el8_1
  • kernel-tools-libs-0:4.18.0-147.13.2.el8_1
  • kernel-tools-libs-devel-0:4.18.0-147.13.2.el8_1
  • kernel-zfcpdump-0:4.18.0-147.13.2.el8_1
  • kernel-zfcpdump-core-0:4.18.0-147.13.2.el8_1
  • kernel-zfcpdump-debuginfo-0:4.18.0-147.13.2.el8_1
  • kernel-zfcpdump-devel-0:4.18.0-147.13.2.el8_1
  • kernel-zfcpdump-modules-0:4.18.0-147.13.2.el8_1
  • kernel-zfcpdump-modules-extra-0:4.18.0-147.13.2.el8_1
  • perf-0:4.18.0-147.13.2.el8_1
  • perf-debuginfo-0:4.18.0-147.13.2.el8_1
  • python3-perf-0:4.18.0-147.13.2.el8_1
  • python3-perf-debuginfo-0:4.18.0-147.13.2.el8_1
  • kpatch-patch-4_18_0-147-0:1-13.el8
  • kpatch-patch-4_18_0-147-debuginfo-0:1-13.el8
  • kpatch-patch-4_18_0-147-debugsource-0:1-13.el8
  • kpatch-patch-4_18_0-147_0_2-0:1-9.el8
  • kpatch-patch-4_18_0-147_0_2-debuginfo-0:1-9.el8
  • kpatch-patch-4_18_0-147_0_2-debugsource-0:1-9.el8
  • kpatch-patch-4_18_0-147_0_3-0:1-9.el8
  • kpatch-patch-4_18_0-147_3_1-0:1-9.el8_1
  • kpatch-patch-4_18_0-147_5_1-0:1-4.el8_1
  • kpatch-patch-4_18_0-147_8_1-0:1-2.el8_1
  • kernel-0:3.10.0-693.67.1.el7
  • kernel-abi-whitelists-0:3.10.0-693.67.1.el7
  • kernel-bootwrapper-0:3.10.0-693.67.1.el7
  • kernel-debug-0:3.10.0-693.67.1.el7
  • kernel-debug-debuginfo-0:3.10.0-693.67.1.el7
  • kernel-debug-devel-0:3.10.0-693.67.1.el7
  • kernel-debuginfo-0:3.10.0-693.67.1.el7
  • kernel-debuginfo-common-ppc64le-0:3.10.0-693.67.1.el7
  • kernel-debuginfo-common-x86_64-0:3.10.0-693.67.1.el7
  • kernel-devel-0:3.10.0-693.67.1.el7
  • kernel-doc-0:3.10.0-693.67.1.el7
  • kernel-headers-0:3.10.0-693.67.1.el7
  • kernel-tools-0:3.10.0-693.67.1.el7
  • kernel-tools-debuginfo-0:3.10.0-693.67.1.el7
  • kernel-tools-libs-0:3.10.0-693.67.1.el7
  • kernel-tools-libs-devel-0:3.10.0-693.67.1.el7
  • perf-0:3.10.0-693.67.1.el7
  • perf-debuginfo-0:3.10.0-693.67.1.el7
  • python-perf-0:3.10.0-693.67.1.el7
  • python-perf-debuginfo-0:3.10.0-693.67.1.el7
  • kernel-rt-1:3.10.0-693.67.1.rt56.665.el6rt
  • kernel-rt-debug-1:3.10.0-693.67.1.rt56.665.el6rt
  • kernel-rt-debug-debuginfo-1:3.10.0-693.67.1.rt56.665.el6rt
  • kernel-rt-debug-devel-1:3.10.0-693.67.1.rt56.665.el6rt
  • kernel-rt-debuginfo-1:3.10.0-693.67.1.rt56.665.el6rt
  • kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.67.1.rt56.665.el6rt
  • kernel-rt-devel-1:3.10.0-693.67.1.rt56.665.el6rt
  • kernel-rt-doc-1:3.10.0-693.67.1.rt56.665.el6rt
  • kernel-rt-firmware-1:3.10.0-693.67.1.rt56.665.el6rt
  • kernel-rt-trace-1:3.10.0-693.67.1.rt56.665.el6rt
  • kernel-rt-trace-debuginfo-1:3.10.0-693.67.1.rt56.665.el6rt
  • kernel-rt-trace-devel-1:3.10.0-693.67.1.rt56.665.el6rt
  • kernel-rt-vanilla-1:3.10.0-693.67.1.rt56.665.el6rt
  • kernel-rt-vanilla-debuginfo-1:3.10.0-693.67.1.rt56.665.el6rt
  • kernel-rt-vanilla-devel-1:3.10.0-693.67.1.rt56.665.el6rt
  • kernel-0:3.10.0-514.76.1.el7
  • kernel-abi-whitelists-0:3.10.0-514.76.1.el7
  • kernel-bootwrapper-0:3.10.0-514.76.1.el7
  • kernel-debug-0:3.10.0-514.76.1.el7
  • kernel-debug-debuginfo-0:3.10.0-514.76.1.el7
  • kernel-debug-devel-0:3.10.0-514.76.1.el7
  • kernel-debuginfo-0:3.10.0-514.76.1.el7
  • kernel-debuginfo-common-ppc64le-0:3.10.0-514.76.1.el7
  • kernel-debuginfo-common-x86_64-0:3.10.0-514.76.1.el7
  • kernel-devel-0:3.10.0-514.76.1.el7
  • kernel-doc-0:3.10.0-514.76.1.el7
  • kernel-headers-0:3.10.0-514.76.1.el7
  • kernel-tools-0:3.10.0-514.76.1.el7
  • kernel-tools-debuginfo-0:3.10.0-514.76.1.el7
  • kernel-tools-libs-0:3.10.0-514.76.1.el7
  • kernel-tools-libs-devel-0:3.10.0-514.76.1.el7
  • perf-0:3.10.0-514.76.1.el7
  • perf-debuginfo-0:3.10.0-514.76.1.el7
  • python-perf-0:3.10.0-514.76.1.el7
  • python-perf-debuginfo-0:3.10.0-514.76.1.el7
  • kernel-0:3.10.0-327.88.1.el7
  • kernel-abi-whitelists-0:3.10.0-327.88.1.el7
  • kernel-debug-0:3.10.0-327.88.1.el7
  • kernel-debug-debuginfo-0:3.10.0-327.88.1.el7
  • kernel-debug-devel-0:3.10.0-327.88.1.el7
  • kernel-debuginfo-0:3.10.0-327.88.1.el7
  • kernel-debuginfo-common-x86_64-0:3.10.0-327.88.1.el7
  • kernel-devel-0:3.10.0-327.88.1.el7
  • kernel-doc-0:3.10.0-327.88.1.el7
  • kernel-headers-0:3.10.0-327.88.1.el7
  • kernel-tools-0:3.10.0-327.88.1.el7
  • kernel-tools-debuginfo-0:3.10.0-327.88.1.el7
  • kernel-tools-libs-0:3.10.0-327.88.1.el7
  • kernel-tools-libs-devel-0:3.10.0-327.88.1.el7
  • perf-0:3.10.0-327.88.1.el7
  • perf-debuginfo-0:3.10.0-327.88.1.el7
  • python-perf-0:3.10.0-327.88.1.el7
  • python-perf-debuginfo-0:3.10.0-327.88.1.el7
  • bpftool-0:3.10.0-957.54.1.el7
  • kernel-0:3.10.0-957.54.1.el7
  • kernel-abi-whitelists-0:3.10.0-957.54.1.el7
  • kernel-bootwrapper-0:3.10.0-957.54.1.el7
  • kernel-debug-0:3.10.0-957.54.1.el7
  • kernel-debug-debuginfo-0:3.10.0-957.54.1.el7
  • kernel-debug-devel-0:3.10.0-957.54.1.el7
  • kernel-debuginfo-0:3.10.0-957.54.1.el7
  • kernel-debuginfo-common-ppc64-0:3.10.0-957.54.1.el7
  • kernel-debuginfo-common-ppc64le-0:3.10.0-957.54.1.el7
  • kernel-debuginfo-common-s390x-0:3.10.0-957.54.1.el7
  • kernel-debuginfo-common-x86_64-0:3.10.0-957.54.1.el7
  • kernel-devel-0:3.10.0-957.54.1.el7
  • kernel-doc-0:3.10.0-957.54.1.el7
  • kernel-headers-0:3.10.0-957.54.1.el7
  • kernel-kdump-0:3.10.0-957.54.1.el7
  • kernel-kdump-debuginfo-0:3.10.0-957.54.1.el7
  • kernel-kdump-devel-0:3.10.0-957.54.1.el7
  • kernel-tools-0:3.10.0-957.54.1.el7
  • kernel-tools-debuginfo-0:3.10.0-957.54.1.el7
  • kernel-tools-libs-0:3.10.0-957.54.1.el7
  • kernel-tools-libs-devel-0:3.10.0-957.54.1.el7
  • perf-0:3.10.0-957.54.1.el7
  • perf-debuginfo-0:3.10.0-957.54.1.el7
  • python-perf-0:3.10.0-957.54.1.el7
  • python-perf-debuginfo-0:3.10.0-957.54.1.el7
  • kpatch-patch-3_10_0-957_35_1-0:1-9.el7
  • kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-9.el7
  • kpatch-patch-3_10_0-957_35_2-0:1-8.el7
  • kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-8.el7
  • kpatch-patch-3_10_0-957_38_1-0:1-7.el7
  • kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-7.el7
  • kpatch-patch-3_10_0-957_38_2-0:1-6.el7
  • kpatch-patch-3_10_0-957_38_3-0:1-6.el7
  • kpatch-patch-3_10_0-957_41_1-0:1-4.el7
  • kpatch-patch-3_10_0-957_43_1-0:1-4.el7
  • kpatch-patch-3_10_0-957_46_1-0:1-3.el7
  • kpatch-patch-3_10_0-957_48_1-0:1-3.el7
  • bpftool-0:4.18.0-80.23.2.el8_0
  • bpftool-debuginfo-0:4.18.0-80.23.2.el8_0
  • kernel-0:4.18.0-80.23.2.el8_0
  • kernel-abi-whitelists-0:4.18.0-80.23.2.el8_0
  • kernel-core-0:4.18.0-80.23.2.el8_0
  • kernel-cross-headers-0:4.18.0-80.23.2.el8_0
  • kernel-debug-0:4.18.0-80.23.2.el8_0
  • kernel-debug-core-0:4.18.0-80.23.2.el8_0
  • kernel-debug-debuginfo-0:4.18.0-80.23.2.el8_0
  • kernel-debug-devel-0:4.18.0-80.23.2.el8_0
  • kernel-debug-modules-0:4.18.0-80.23.2.el8_0
  • kernel-debug-modules-extra-0:4.18.0-80.23.2.el8_0
  • kernel-debuginfo-0:4.18.0-80.23.2.el8_0
  • kernel-debuginfo-common-aarch64-0:4.18.0-80.23.2.el8_0
  • kernel-debuginfo-common-ppc64le-0:4.18.0-80.23.2.el8_0
  • kernel-debuginfo-common-s390x-0:4.18.0-80.23.2.el8_0
  • kernel-debuginfo-common-x86_64-0:4.18.0-80.23.2.el8_0
  • kernel-devel-0:4.18.0-80.23.2.el8_0
  • kernel-doc-0:4.18.0-80.23.2.el8_0
  • kernel-headers-0:4.18.0-80.23.2.el8_0
  • kernel-modules-0:4.18.0-80.23.2.el8_0
  • kernel-modules-extra-0:4.18.0-80.23.2.el8_0
  • kernel-tools-0:4.18.0-80.23.2.el8_0
  • kernel-tools-debuginfo-0:4.18.0-80.23.2.el8_0
  • kernel-tools-libs-0:4.18.0-80.23.2.el8_0
  • kernel-zfcpdump-0:4.18.0-80.23.2.el8_0
  • kernel-zfcpdump-core-0:4.18.0-80.23.2.el8_0
  • kernel-zfcpdump-debuginfo-0:4.18.0-80.23.2.el8_0
  • kernel-zfcpdump-devel-0:4.18.0-80.23.2.el8_0
  • kernel-zfcpdump-modules-0:4.18.0-80.23.2.el8_0
  • kernel-zfcpdump-modules-extra-0:4.18.0-80.23.2.el8_0
  • perf-0:4.18.0-80.23.2.el8_0
  • perf-debuginfo-0:4.18.0-80.23.2.el8_0
  • python3-perf-0:4.18.0-80.23.2.el8_0
  • python3-perf-debuginfo-0:4.18.0-80.23.2.el8_0